From security@wirex.com Sun Jun 17 21:59:35 2001
From: Immunix Security Team
To: bugtraq@securityfocus.com
Date: Thu, 14 Jun 2001 16:55:57 -0700
Subject: sysklogd update -- Immunix OS 6.2, 7.0-beta, 7.0
-----------------------------------------------------------------------
Immunix OS Security Advisory
Packages updated: sysklogd
Affected products: Immunix OS 6.2, 7.0-beta, and 7.0
Bugs fixed: immunix/1623
Date: Thu Jun 14 2001
Advisory ID: IMNX-2001-70-026-01
Author: Seth Arnold
-----------------------------------------------------------------------
Description:
The Linux kernel logging daemon klogd distributed in the sysklogd
package can be forced to quit if it receives a null byte in a log
message from the Linux kernel. These updates have applied a patch
from roessler at does-not-exist dot org to fix this problem.
Because an attacker would need to convince the kernel to log a null
byte in order to exploit this problem, we don't think it is an issue
for most sites; however, the bug was found when a kernel module
supplied with kernel 2.4 attempted to print a null byte.
We recommend Immunix OS users upgrade their sysklogd packages.
References:
http://bugs.debian.org/cgi-bin/bugreport.cgi?archive=no&bug=85478
Package names and locations:
Precompiled binary packages for Immunix 6.2 are available at:
http://download.immunix.org/ImmunixOS/6.2/updates/RPMS/sysklogd-1.3.31-18_StackGuard.i386.rpm
Source packages for Immunix 6.2 are available at:
http://download.immunix.org/ImmunixOS/6.2/updates/SRPMS/sysklogd-1.3.31-18_StackGuard.src.rpm
Precompiled binary packages for Immunix 7.0-beta and 7.0 are available at:
http://download.immunix.org/ImmunixOS/7.0/updates/SRPMS/sysklogd-1.3.33-9_imnx.src.rpm
Source package for Immunix 7.0-beta and 7.0 is available at:
http://download.immunix.org/ImmunixOS/7.0/updates/SRPMS/sysklogd-1.3.33-9_imnx.src.rpm
md5sums of the packages:
6.2:
8f1dca74c72179aba3a04226f916b4a2 RPMS/sysklogd-1.3.31-18_StackGuard.i386.rpm
4fdf88fd615bce2d730915d5812eaf97 SRPMS/sysklogd-1.3.31-18_StackGuard.src.rpm
7.0:
577a073a871475704a68fde712a90b1e RPMS/sysklogd-1.3.33-9_imnx.i386.rpm
3add2ae895e9c4dad1e9737807cc1f30 SRPMS/sysklogd-1.3.33-9_imnx.src.rpm
GPG verification:
Our public key is available at .
*** NOTE *** This key is different from the one used in advisories
IMNX-2001-70-020-01 and earlier.
Online version of all Immunix 6.2 updates and advisories:
http://immunix.org/ImmunixOS/6.2/updates/
Online version of all Immunix 7.0-beta updates and advisories:
http://immunix.org/ImmunixOS/7.0-beta/updates/
Online version of all Immunix 7.0 updates and advisories:
http://immunix.org/ImmunixOS/7.0/updates/
NOTE:
Ibiblio is graciously mirroring our updates, so if the links above are
slow, please try:
ftp://ftp.ibiblio.org/pub/Linux/distributions/immunix/
or one of the many mirrors available at:
http://www.ibiblio.org/pub/Linux/MIRRORS.html
Contact information:
To report vulnerabilities, please contact security@wirex.com. WireX
attempts to conform to the RFP vulnerability disclosure protocol
.
[Part 2, Application/PGP-SIGNATURE 248bytes]
[Unable to print this part]